Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification

Size: px
Start display at page:

Download "Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification"

Transcription

1 Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification Daigo Muramatsu 1 and Takashi Matsumoto 2 1 Department of Electrical and Mechanical Engineering, Seikei University, Kichijoji-kitamachi, Musashino-shi, Tokyo , Japan muramatsu@st.seikei.ac.jp 2 Department of Electrical Engineering and Bioscience, Waseda University, Okubo, Shinjuku-ku, Tokyo , Japan takashi@mse.waseda.ac.jp Abstract. Many algorithms for online signature verification using multiple features have been proposed. Recently it has been argued that pen pressure, azimuth, and altitude can cause instability and deteriorate the performance. Algorithms without pen pressure and inclination features outperformed with them in SVC2004. However, we previously found that these features improved the performance in evaluations using our private database. The effectiveness of the features thus depended on the algorithm. Therefore, we re-evaluated our algorithm using the same database as used in SVC2004 and discuss the effectiveness of pen pressure, azimuth and altitude. Experimental results show that even though these features are not so effective when they are used by themselves, they improved the performance when used in combination with other features. When pen pressure and inclination features were considered, an EER of 3.61% was achieved, compared to an EER of 5.79% when these features were not used. Keywords: Online signature verification, Pen pressure, Pen azimuth, Pen altitude, Fusion, SVC Introduction Recently, the renewed interest in biometric authentication has resulted in its application to many situations. Several biometric authentication methods have been proposed and studied; however, no perfect method currently exists. The suitability of the method depends on the situation, as well as the required security level. Online signature verification is a promising candidate as an authentication method for several reasons. First, handwritten signatures are widely accepted as the authentication method in many countries for various purposes, such as authorizing credit card and banking transactions and signing agreements and legal documents. S.-W. Lee and S.Z. Li (Eds.): ICB 2007, LNCS 4642, pp , c Springer-Verlag Berlin Heidelberg 2007

2 504 D. Muramatsu and T. Matsumoto Second, because online signature verification can incorporate dynamic information about the handwritten signature, it can often achieve higher performance than static signatures[1]. Moreover, since it is difficult to extract dynamic information from a static signature, it is more difficult to forge. Finally, a person can modify his or her signature if it is stolen. This is a notable feature because physiological biometrics such as fingerprints or irises cannot be modified or renewed. Therefore, online signature verification is a promising candidate as an authentication method. However, online signature verification is not perfect, and it is important to develop algorithms that can achieve high performance. Many algorithms have been proposed for online signature verification, using multiple features acquired using various types of devices. Some special devices[2] [4] and techniques[5] for doing so have been proposed; however, popular devices for online signature verification are tablets (graphic tablets), Tablet PCs, and PDAs. The features that can be obtained depend on the type of device; for example, only pen position and pen up/down information are available using PDAs, whereas pen pressure features are also available when using Tablet PCs. Moreover, some tablets can acquire pen inclination information, like pen altitude and azimuth. Some public databases for online signature verification, for example, BIOMET[6], MCYT[7], and SVC[8], were prepared using data captured from tablets. Thus, information about pen position, pen pressure, pen altitude, and pen azimuth is available 1 Researchers who use these databases generally use all of the information in the database[9] [14]. However, it has argued that using the pressure, azimuth, and altitude can cause instability and deteriorate the performance [8][15]-[17]. The First International Signature Verification Competition (SVC) was held in 2004; there were two tasks in the competition, Task 1 and Task 2. Participants could use pen position, pressure, azimuth, and altitude in Task 2, though only pen position and pen up/down information were available in Task 1. The results of Task 1 outperformed those of Task 2[8]. As a result, some researchers have stopped using pen pressure,[15], pen altitude, and pen azimuth[16] or have expressed concern about using pen inclination features[17]. On the other hand, some researchers have proposed algorithms taking account of pen inclination features and reported improved performance[18] [20]. We also reported improved performance using pen pressure and inclination features[14]. However, the databases used by researchers for evaluation were not same. Thus, we evaluated an algorithm using the same database as that used in SVC2004 and report the results in this paper. We performed several experiments, and the results show that our algorithm could improve the performance from an equal error rate (EER) of 5.79% to 3.61% for user-dependent threshold parameters, and from % to % for a global threshold parameter by using pen pressure, altitude, and azimuth features. Thus, the effectiveness of using these features depends on the type of algorithm. 1 Information about pen pressure, pen altitude, and pen azimuth were not made available in Task 1 of the SVC database.

3 Effectiveness of Pen Pressure, Azimuth, and Altitude Features 505 Training phase Verification phase Enrollment phase Training Data Preprocessing Feature Extraction Distance Calculation Model Generation Model Data Acquisition Preprocessing Feature Extraction Distance Calculation Decision Making Data Acquisition Preprocessing Feature Extraction Enrollment Reference Fig. 1. Overall algorithm 2 The Algorithm Figure 1 depicts our algorithm for online signature verification. There are three phases in the algorithm: (i) Training phase Signatures for training are provided in the training phase. After preprocessing and feature extraction, multiple distances between the training signatures are calculated. Parameters of a fusion model are estimated by using the distances from the training signatures. (ii) Enrollment phase In the enrollment phase, candidates of reference signatures are provided, together with the identity of the users (signers). After preprocessing and feature extraction, reference signatures are selected. (iii) Verification phase In the verification phase, a signature under question, with a claimed identity, is provided. After preprocessing and feature extraction, multiple distances between the signature under question and the reference signatures are calculated. Then, these multiple distances are combined in the fusion model and a decision is made. The training, enrollment, and verification phases involve all or some of the following stages: (a) data acquisition, (b) pre-processing, (c) feature extraction, (d) enrollment, (e) similarity/distance calculation, (f) model generation, and (g) decision making. The boundaries between the stages are not rigid; therefore, one stage can be included in another stage. Only the feature extraction, distance calculation, and decision making stages are explained in this paper. Details of our signature verification algorithm were given in reference[11] and reference[14].

4 506 D. Muramatsu and T. Matsumoto Azimuth Pressure Altitude 90 y x 180 Fig. 2. Data from the tablet Fig. 3. Top: Trajectories of x and y pen positions. Middle: Trajectory of pen pressure. Bottom: Trajectories of azimuth and altitude. 2.1 Feature Extraction Raw data from the tablet consists of five-dimensional time-series data: Signature =(x(j),y(j),p(j),ψ(j),φ(j)) (1) j =1, 2,..., J Here, (x(j),y(j)) is the pen position; p(j), the pen pressure; ψ(j), the azimuth; and φ(j), the altitude of the pen at time j (depicted in Figs. 2 and 3). The following features are extracted from the raw data. X(j) = x(j) x g x max x min (2) Y (j) = y(j) y g y max y min (3) V (j) = Vx 2(j)+V y 2 (j) (4) θ V (j) =tan 1 V y(j) V x (j) (5) where V x (j) =X(j +1) X(j),V y (j) =Y (j +1) Y (j) where (x g,y g ) is the centroid of the signature, and x min,y min and x max,y max are the minimum and maximum values of x(j),y(j). In addition to the above features, pen pressure p(j), azimuth ψ(j), and altitude φ(j) are used as features. Although other features proposed in reference[16][21]-[23] can be useful, our goal is to discuss the effectiveness of pen pressure, azimuth, and altitude. Thus, we use only seven features in this paper.

5 Effectiveness of Pen Pressure, Azimuth, and Altitude Features Distance Calculation Our approach calculates multiple distances from multiple features using dynamic programming. The distance of each feature was calculated independently. Thus, the distance vector between two signatures, Rsig and Sig, is Dist(Rsig, Sig)=(D X,D Y,D V,D θv,d p,d ψ,d φ ). (6) 2.3 Decision Making Our fusion model calculates the following score: Score(Sig; ID)= M f(x(rsig IDm,Sig),Mean ID ; Θ), (7) m=1 where M is a number of reference signatures and X is the input vector to the fusion model, described by X ( Rsig IDm,Sig) =( D 1(Rsig IDm,Sig) Z 1 T m,.., D i(rsig IDm,Sig),.., D N(Rsig IDm,Sig). (8) Z i T m Z N T m Here, D i is a distance calculated with the i th feature, T m is the duration of the reference signature, Z i is a normalization constant calculated from a training dataset, and N is a dimension of input vector X. Mean ID is a mean vector defined by Mean ID =(mean ID 1 M M mean ID i = 1 M 2 m=1 n=1,.., meanid i,.., mean ID N ) (9) D i (Rsig IDm,Rsig IDn ) Z i T m, (10) and Θ is a parameter set for the fusion model estimated from the training dataset. A final decision is made by the following rule: Signature is { Accept if Score(Sig; ID) Threshold(c) Reject if Score(Sig; ID) < T hreshold(c) (11) where c is a parameter for adjusting the threshold value. 3 Experiments Two experiments are described in this paper: (i) Experiment 1: Performance evaluation of each distance from a feature; and (ii) Experiment 2: Performance evaluation of fusion models that combine different distances. The following three databases were used for evaluating the performance:

6 508 D. Muramatsu and T. Matsumoto BIOMET This database was collected by Garcia-Salicetti et al.[6]. From this database, signatures for 61 persons were used in our experiments. For each person, five genuine signatures were used as reference signatures, and ten genuine signatures from a second session and twelve skillfully forged signatures were used for evaluation. This database was used for training the parameters of the fusion model in Experiment 2 and was used for evaluation only in Experiment1. MCYT This database was collected by Ortega-Garcia et al.[7]. Signatures from 100 persons were used for evaluation in our experiments. For each person, five genuine signatures were used as reference signatures, and twenty genuine signatures and twenty-five skillfully forged signatures were used for evaluation. SVC This database was collected by Yeung et al.[8] and was used for the First International Signature Verification Competition. This database is formed of two databases for task 1 and task 2. In task 2, pen position, pressure, and inclination features are available, whereas in task 1, only pen position and pen up/down features are available. Five genuine signatures randomly selected from a first session were used as reference signatures, and ten genuine signatures from a second session and twenty skillfully forged signatures were used for evaluation in one experiment. We considered ten combinations of five genuine signatures as reference signatures, and performed ten experiments while changing only the reference signatures. These were the same conditions as in the competition and the study described in reference[24]. 3.1 Experiment 1 The three public databases described above, BIOMET, MCYT, and SVC (task 1 and task 2), were used to evaluate the performance. To evaluate the effectiveness of each feature, a one-dimensional distance score was calculated: D (Sig; ID,i)= 1 M M m=1 D i (Rsig IDm,Sig) T m. (12) Table 1. EER for each distance measure (global threshold parameter) No. Feature MCYT BIOMET SVC (task 1) SVC (task 2) 1 X Y V θ V P ψ φ

7 Effectiveness of Pen Pressure, Azimuth, and Altitude Features 509 Then, a decision was made based on { Accept if D Signature = (Sig; ID,i) < T hreshold Di (c) Reject if D (Sig; ID.i) Threshold Di (c). (13) The experimental results are summarized in Table 1. The pen altitude and azimuth did not produce good results; pressure was better than both altitude and azimuth but was worse than pen position and velocity features. 3.2 Experiment2 The BIOMET database was used for training the fusion model parameters, and the MCYT and SVC (task 1 and task 2) databases were used for evaluation. Table 2. EER of fusion model Threshold User-dependent Global Feature set MCYT SVC SVC MCYT SVC SVC (task 1) (task 2) (task 1) (task 2) Setting Setting Setting Setting Setting Setting Setting Setting Setting Fig. 4. Error trade-off curves of fusion model for MCYT and SVC (task 2) databases

8 510 D. Muramatsu and T. Matsumoto The following combinations of distances were evaluated: Setting 1: Dist =(D X,D Y ) Setting 2: Dist =(D X,D Y,D V,D θv ) Setting 3: Dist =(D X,D Y,D V,D θv,d P ) Setting 4: Dist =(D X,D Y,D V,D θv,d ψ ) Setting 5: Dist =(D X,D Y,D V,D θv,d φ ) Setting 6: Dist =(D X,D Y,D V,D θv,d P,D ψ ) Setting 7: Dist =(D X,D Y,D V,D θv,d P,D φ ) Setting 8: Dist =(D X,D Y,D V,D θv,d ψ,d φ ) Setting 9: Dist =(D X,D Y,D V,D θv,d P,D ψ,d φ ) Equal error rates were obtained with both user-dependent threshold parameters and a global threshold parameter (results summarized in Table 2). EER was calculated using the methods of Fingerprint Verification Competition (FVC)[25]. Figure4 shows the error trade-off curve of Setting 2 and Setting 9 for the MCYT and SVC (task 2) databases with a global threshold parameter. An error trade-off curve shows the relation between false rejection rate (FRR) and false acceptance rate (FAR). Judging from the results of Settings 2, 3, 4, and 5, pen pressure, azimuth, and altitude features contributed to improved performance. 4 Conclusion We evaluated our online signature verification algorithm using the BIOMET, MCYT, and SVC public databases. It has recently been argued that pen pressure, azimuth, and altitude can cause instability and deteriorate the performance of online signature verification, because an algorithm that used only pen position features won a previous competition (SVC2004). We evaluated our algorithm using the same databases that were used for that competition. Our experimental results show that, by incorporating both pen pressure and inclination features, we could improve the performance from EER of 5.79% to 3.61% for SVC task 2 with user-dependent threshold parameters, and from EER of 12.67% to 10.15% with a global threshold parameter. Even though these features are not so effective when they are used by themselves, they improved the performance when used together with other features. Moreover, our results outperformed the best result published on the SVC website 2 and reported in [24]. We only evaluated a few features in this study; combinations of many more features, such as those proposed in references[16][21]-[23], should improve the performance. Also, more efficient score normalization algorithm will be necessary because the difference between user-dependent threshold parameters and a global threshold parameter was large. This will be the subject of our future work. 2

9 Acknowledgements Effectiveness of Pen Pressure, Azimuth, and Altitude Features 511 The authors are grateful to J. Ortega-Garcia and J. Fierrez-Aguilar of Universidad Politecnica de Madrid, Madrid, Spain, and to B. Dorizzi and S. Garcia- Salicetti of Institut National Des Telecommunications, Evry, France for providing us with the databases. The authors would also like to thank D.Y. Yeung for advice on the evaluation method used in SVC2004. This work was supported by Grants-in-Aid for Scientific Research from Ministry of Education, Culture, Sports, Science and Technology. References 1. Plamondon, R., Lorette, G.: Automatic signature verification and writer identification - The state of the art. Pattern Recognition 22(2), (1989) 2. Martens, R., Claesen, L.: Incorporating local consistency information into the online signature verification process. IJDAR 1(2), (1998) 3. Shimizu, H., Kiyono, S., Motoki, T., Gao, W.: An electrical pen for signature verification using a two-dimensional optical angle sensor. Sensor and Actuators A111, (2004) 4. Hook, C., Kempf, J., Scharfenberg, G.: A Novel digitizing pen for the analysis of pen pressure and inclination in handwriting biometrics. In: Maltoni, D., Jain, A.K. (eds.) BioAW LNCS, vol. 3087, pp Springer, Heidelberg (2004) 5. Munich, M.E., Perona, P.: Visual identification by signature tracking. IEEE Trans. Pattern Anal. and Machine Intell. 25(2), (2003) 6. Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B., Leroux-Les Jardins, J., Lunter, J., Ni, Y., Petrovska-Delacretaz, D.: BIOMET: a multimodal person authentication database including face, voice, fingerprint, hand and signature modalities. In: Kittler, J., Nixon, M.S. (eds.) AVBPA LNCS, vol. 2688, pp Springer, Heidelberg (2003) 7. Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: MCYT baseline corpus: a bimodal biometric database. IEE Proceedings Vision, Image and Signal Processing 150(6), (2003) 8. Yeung, D.-Y., Chang, H., Xiong, Y., George, S., Kashi, R., Matsumoto, T., Rigoll, G.: SVC. First international signature verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA LNCS, vol. 3072, pp Springer, Heidelberg (2004) 9. Ortega-Garcia, J., Fierrez-Aguilar, J., Martin-Rello, J., Gonzalez-Rodriguez, J.: Complete signal modeling and score normalization for function-based dynamic signature verification. In: Kittler, J., Nixon, M.S. (eds.) AVBPA LNCS, vol. 2688, pp Springer, Heidelberg (2003) 10. Van Ly, B., Garcia-Salicetti, S., Dorizzi, B.: Fusion of HMM s likelihood and viterbi path for on-line signature verification. In: Maltoni, D., Jain, A.K. (eds.) BioAW LNCS, vol. 3087, pp Springer, Heidelberg (2004) 11. Hongo, Y., Muramatsu, D., Matsumoto, T.: Modification on intersession variability in on-line signature verifier. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA LNCS, vol. 3546, pp Springer, Heidelberg (2005) 12. Muramatsu, D., Kondo, M., Sasaki, M., Tachibana, S., Matsumoto, T.: A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification. IEEE Trans. Information Forensics and Security 1(1), (2006)

10 512 D. Muramatsu and T. Matsumoto 13. Marcos Faundez-Zanuy, M.: On-line signature recognition based on VQ-DTW. Pattern Recognition 40, (2007) 14. Muramatsu, D., Matsumoto, T.: Online signature verification using user generic fusion model. IEICE Trans. J90-D(2), (2007) 15. Kholmatov, A., Yanikoglu, B.: Identity authentication using improved online signature verification method. Pattern Recognition Letters 26(15), (2005) 16. Fierrez-Aguilar, J., Nannil, L., Lopez-Peñalba, J., Ortega-Garcia, J., Maltoni, D.: An on-line signature verification system based on fusion of local and global information. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA LNCS, vol. 3546, pp Springer, Heidelberg (2005) 17. Lei, H., Govindaraju, V.: A comparative study on the consistency of features in online signature verification. Pattern Recognition Letters 26(15), (2005) 18. Taguchi, H., Kiriyama, K., Tanaka, E., Fujii, K.: On-line recognition of handwritten signature by feature extraction of the pen movements. IEICE Trans. J71-D(5), (1988) (Japanese) 19. Komiya, Y., Ohishi, T., Matsumoto, T.: A pen input on-line signature verifier integration position, pressure and inclination trajectories. IEICE Trans. INF. & SYST. E84-D(7), (2001) 20. Hangai, S., Yamanaka, S., Hanamoto, T.: On-line signature verification based on altitude and direction of pen movement. In: Proc. ICME 2000, vol. 1, pp (2000) 21. Lee, L.L., Berger, T., Aviczer, E.: Reliable on-line human signature verification systems. IEEE Trans. Pattern Anal. and Machine Intell. 18(6), (1996) 22. Nalwa, V.S.: Automatic on-line signature verification. Proc. IEEE 85(2), (1997) 23. Jain, A.K., Griess, F.D., Connell, S.D.: On-line signature verification. Pattern Recognition 35(12), (2002) 24. Fierrez-Aguilar, J., Krawczyk, S., Ortega-Garcia, J., Jain, A.K.: Fusion of local and regional approaches for on-line signature verification. In: Li, S.Z., Sun, Z., Tan, T., Pankanti, S., Chollet, G., Zhang, D. (eds.) IWBRS LNCS, vol. 3781, pp Springer, Heidelberg (2005) 25. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint verification competition. IEEE Trans. on Pattern Anal. Machine Intell. 24(3), (2003)

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Cryptographic key generation using handwritten signature

Cryptographic key generation using handwritten signature Cryptographic key generation using handwritten signature M. Freire-Santos a, J. Fierrez-Aguilar a, J. Ortega-Garcia a a ATVS-Biometrics Research Lab., Escuela Politecnica Superior, Universidad Autonoma

More information

Discriminative Multimodal Biometric. Authentication Based on Quality Measures

Discriminative Multimodal Biometric. Authentication Based on Quality Measures Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,

More information

Identity authentication using improved online signature verification method

Identity authentication using improved online signature verification method Pattern Recognition Letters 26 (2005) 2400 2408 www.elsevier.com/locate/patrec Identity authentication using improved online signature verification method Alisher Kholmatov, Berrin Yanikoglu * Sabanci

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

Securing Electronic Medical Records Using Biometric Authentication

Securing Electronic Medical Records Using Biometric Authentication Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring

More information

Pattern Recognition 45 (2012) 993 1003. Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: www.elsevier.

Pattern Recognition 45 (2012) 993 1003. Contents lists available at ScienceDirect. Pattern Recognition. journal homepage: www.elsevier. Pattern Recognition 45 (2012) 993 1003 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr BioSecure signature evaluation campaign (BSEC 2009): Evaluating

More information

Securing Electronic Medical Records using Biometric Authentication

Securing Electronic Medical Records using Biometric Authentication Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, krawcz10@cse.msu.edu, jain@cse.msu.edu Abstract.

More information

Open Source Reference Systems for Biometric Verification of Identity

Open Source Reference Systems for Biometric Verification of Identity Open Source Reference Systems for Biometric Verification of Identity Aurélien Mayoue and Dijana Petrovska-Delacrétaz TELECOM & Management SudParis, 9 rue Charles Fourier, 91011 Evry Cedex, France Abstract.

More information

Effects of Time Normalization on the Accuracy of Dynamic Time Warping

Effects of Time Normalization on the Accuracy of Dynamic Time Warping Effects of Time Normalization on the Accuracy of Dynamic Time Warping Olaf Henniger Sascha Müller Abstract This paper revisits Dynamic Time Warping, a method for assessing the dissimilarity of time series.

More information

Visual-based ID Verification by Signature Tracking

Visual-based ID Verification by Signature Tracking Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Performance Evaluation of Biometric Template Update

Performance Evaluation of Biometric Template Update Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: romain.giot@ensicaen.fr

More information

On-line signature verication

On-line signature verication Pattern Recognition 35 (2002) 2963 2972 www.elsevier.com/locate/patcog On-line signature verication Anil K. Jain, Friederike D. Griess, Scott D. Connell Department of Computer Science and Engineering,

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),

More information

Support Vector Machines for Dynamic Biometric Handwriting Classification

Support Vector Machines for Dynamic Biometric Handwriting Classification Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the

More information

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security , pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,

More information

"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES

LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES "LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES Dr. Marino Tapiador Technical Manager of the Certification Area Spanish Certification Body National Cryptologic Center

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

3D Signature for Efficient Authentication in Multimodal Biometric Security Systems

3D Signature for Efficient Authentication in Multimodal Biometric Security Systems 3D Signature for Efficient Authentication in Multimodal Biometric Security Systems P. M. Rubesh Anand, Gaurav Bajpai, and Vidhyacharan Bhaskar Abstract Unimodal biometric systems rely on a single source

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation Published in IET Biometrics Received on 1st September 2013 Revised on 15th January 2014 Accepted on 10th February 2014 Special Issue: Integration of Biometrics and Forensics ISSN 2047-4938 Regional fusion

More information

Numerical Field Extraction in Handwritten Incoming Mail Documents

Numerical Field Extraction in Handwritten Incoming Mail Documents Numerical Field Extraction in Handwritten Incoming Mail Documents Guillaume Koch, Laurent Heutte and Thierry Paquet PSI, FRE CNRS 2645, Université de Rouen, 76821 Mont-Saint-Aignan, France Laurent.Heutte@univ-rouen.fr

More information

Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011)

Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) 2011 International Conference on Document Analysis and Recognition Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) Marcus Liwicki, Muhammad Imran Malik, C. Elisa

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification

Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification BENCE KOVARI, HASSAN CHARAF Department of Automation and Applied Informatics Budapest University

More information

A colour Code Algorithm for Signature Recognition

A colour Code Algorithm for Signature Recognition Electronic Letters on Computer Vision and Image Analysis 6(1):1-12, 2007 A colour Code Algorithm for Signature Recognition Vinayak Balkrishana Kulkarni Department of Electronics Engineering. Finolex Academy

More information

Handwritten Signature Verification using Neural Network

Handwritten Signature Verification using Neural Network Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering

More information

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device 2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH

USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH By Stephen Krawczyk A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

A Comparative Study on ATM Security with Multimodal Biometric System

A Comparative Study on ATM Security with Multimodal Biometric System A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor

More information

Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems

Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,

More information

A NEW SYSTEM FOR SECURE HANDWRITTEN SIGNING OF DOCUMENTS

A NEW SYSTEM FOR SECURE HANDWRITTEN SIGNING OF DOCUMENTS International Journal of Computer Science and Applications c Technomathematics Research Foundation Vol. 12 No. 2, pp. 37-56, 2015 A NEW SYSTEM FOR SECURE HANDWRITTEN SIGNING OF DOCUMENTS MARCO QUERINI,

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Personal Identification Techniques Based on Operational Habit of Cellular Phone Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular

More information

Face Recognition at a Distance: Scenario Analysis and Applications

Face Recognition at a Distance: Scenario Analysis and Applications Face Recognition at a Distance: Scenario Analysis and Applications R. Vera-Rodriguez, J. Fierrez, P. Tome, and J. Ortega-Garcia Abstract. Face recognition is the most popular biometric used in applications

More information

Online Farsi Handwritten Character Recognition Using Hidden Markov Model

Online Farsi Handwritten Character Recognition Using Hidden Markov Model Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,

More information

Mobile Based Online Signature Verification for Multi-modal Authentication

Mobile Based Online Signature Verification for Multi-modal Authentication Mobile Based Online Signature Verification for Multi-modal Authentication Navid Forhad, Bruce Poon, M. Ashraful Amin, Hong Yan Abstract Providing authenticity of information has always been a challenging

More information

A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users

A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users 2012 IEEE Sixth International Conference on Software Security and Reliability A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users Chien-Cheng Lin Dept. of Computer

More information

Multi-Factor Biometrics: An Overview

Multi-Factor Biometrics: An Overview Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems

More information

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Automatic Biometric Student Attendance System: A Case Study Christian Service University College Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions

More information

A Lightweight and Effective Music Score Recognition on Mobile Phone

A Lightweight and Effective Music Score Recognition on Mobile Phone J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Extending EMV payment smart cards with biometric on-card verification

Extending EMV payment smart cards with biometric on-card verification Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,

More information

AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM

AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI

More information

Fingerprint s Core Point Detection using Gradient Field Mask

Fingerprint s Core Point Detection using Gradient Field Mask Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain

MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,

More information

Abstract. 1. Introduction. 1.1. Methodology

Abstract. 1. Introduction. 1.1. Methodology Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

2nd International Workshop on Automated Forensic Handwriting Analysis (AFHA) 2013

2nd International Workshop on Automated Forensic Handwriting Analysis (AFHA) 2013 2nd International Workshop on Automated Forensic Handwriting Analysis (AFHA) 2013 22-23 August 2013, Washington DC, USA AFHA 2013 PREFACE Handwriting is considered as a representative of human behavior

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/54957

More information

On the Operational Quality of Fingerprint Scanners

On the Operational Quality of Fingerprint Scanners BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The

More information

A Comparison of Photometric Normalisation Algorithms for Face Verification

A Comparison of Photometric Normalisation Algorithms for Face Verification A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,

More information

Comparing Improved Versions of K-Means and Subtractive Clustering in a Tracking Application

Comparing Improved Versions of K-Means and Subtractive Clustering in a Tracking Application Comparing Improved Versions of K-Means and Subtractive Clustering in a Tracking Application Marta Marrón Romera, Miguel Angel Sotelo Vázquez, and Juan Carlos García García Electronics Department, University

More information

Accuracy and Security Evaluation of Multi-Factor Biometric Authentication

Accuracy and Security Evaluation of Multi-Factor Biometric Authentication Accuracy and Security Evaluation of Multi-Factor Biometric Authentication Hisham Al-Assam, Harin Sellahewa, Sabah Jassim Department of Applied Computing University of Buckingham Buckingham, MK18 1EG, United

More information

Medical Image Segmentation of PACS System Image Post-processing *

Medical Image Segmentation of PACS System Image Post-processing * Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China

More information

IMDA Systems: Digital Signature Verification

IMDA Systems: Digital Signature Verification IMDA Systems: Digital Signature Verification ECE-492/3 Senior Design Project Spring 2011 Electrical and Computer Engineering Department Volgenau School of Engineering George Mason University Fairfax, VA

More information

Paper-based Document Authentication using Digital Signature and QR Code

Paper-based Document Authentication using Digital Signature and QR Code 2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department

More information

Keywords: fingerprints, attendance, enrollment, authentication, identification

Keywords: fingerprints, attendance, enrollment, authentication, identification Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

What is the Right Illumination Normalization for Face Recognition?

What is the Right Illumination Normalization for Face Recognition? What is the Right Illumination Normalization for Face Recognition? Aishat Mahmoud Dan-ali Department of Computer Science and Engineering The American University in Cairo AUC Avenue, P.O. Box 74, New Cairo

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications

The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications Forensic Science International 146S (2004) S95 S99 www.elsevier.com/locate/forsciint The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications A.

More information

Non-parametric score normalization for biometric verification systems

Non-parametric score normalization for biometric verification systems Non-parametric score normalization for biometric verification systems Vitomir Štruc, Jerneja Žganec Gros 2, and Nikola Pavešić Faculty of Electrical Engineering, University of Ljubljana, Tržaška 25, Ljubljana,

More information

Optimizing the Global Execution Time with CUDA and BIGDATA from a Neural System of Off-line Signature Verification on Checks.

Optimizing the Global Execution Time with CUDA and BIGDATA from a Neural System of Off-line Signature Verification on Checks. Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'5 495 Optimizing the Global Execution Time with CUDA and BIGDATA from a Neural System of Off-line Signature Verification on Checks. Francisco Javier

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Research Article GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test

Research Article GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test Hindawi Publishing Corporation EURSIP Journal on Information Security Volume 2010, rticle ID 391761, 11 pages doi:10.1155/2010/391761 Research rticle GUC100 Multisensor Fingerprint Database for In-House

More information

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer

More information

Aman Chadha et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1419-1425

Aman Chadha et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1419-1425 Rotation, Scaling and Translation Analysis of Biometric Templates Aman Chadha, Divya Jyoti, M. Mani Roja Thadomal Shahani Engineering College, Mumbai, India aman.x64@gmail.com Abstract Biometric authentication

More information

Article. Electronic Signature Forensics. Copyright Topaz Systems Inc. All rights reserved.

Article. Electronic Signature Forensics. Copyright Topaz Systems Inc. All rights reserved. Article Electronic Signature Forensics Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview...

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print A Comparative Study of Fingerprint Image-Quality Estimation Methods F. Alonso-Fernandez, J. Fierrez, J. Ortega-Garcia, J. Gonzalez-Rodriguez, Hartwig Fronthaler, Klaus Kollreider

More information

Biometric Sensor Interoperability: A Case Study In Fingerprints

Biometric Sensor Interoperability: A Case Study In Fingerprints Biometric Sensor Interoperability: A Case Study In Fingerprints Arun Ross 1 and Anil Jain 2 1 West Virginia University, Morgantown, WV, USA 26506 ross@csee.wvu.edu 2 Michigan State University, East Lansing,

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Domain Classification of Technical Terms Using the Web

Domain Classification of Technical Terms Using the Web Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using

More information

Personal identi"cation based on handwriting

Personal identication based on handwriting Pattern Recognition 33 (2000) 149}160 Personal identi"cation based on handwriting H.E.S. Said *, T.N. Tan, K.D. Baker Department of Computer Science, University of Reading, Whiteknights, P.O.Box 225, Reading,

More information

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4]. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique

More information

Comparison of Elastic Matching Algorithms for Online Tamil Handwritten Character Recognition

Comparison of Elastic Matching Algorithms for Online Tamil Handwritten Character Recognition Comparison of Elastic Matching Algorithms for Online Tamil Handwritten Character Recognition Niranjan Joshi, G Sita, and A G Ramakrishnan Indian Institute of Science, Bangalore, India joshi,sita,agr @ragashrieeiiscernetin

More information

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio

More information

Prediction of Heart Disease Using Naïve Bayes Algorithm

Prediction of Heart Disease Using Naïve Bayes Algorithm Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,

More information

Use of Human Big Data to Help Improve Productivity in Service Businesses

Use of Human Big Data to Help Improve Productivity in Service Businesses Hitachi Review Vol. 6 (216), No. 2 847 Featured Articles Use of Human Big Data to Help Improve Productivity in Service Businesses Satomi Tsuji Hisanaga Omori Kenji Samejima Kazuo Yano, Dr. Eng. OVERVIEW:

More information

Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS

Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS S. Prabu School of Computing Science & Engineering Vellore Institute of Technology Vellore, Tamilnadu, India

More information

Normalisation of 3D Face Data

Normalisation of 3D Face Data Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,

More information

Implementation of Biometric Techniques in Social Networking Sites

Implementation of Biometric Techniques in Social Networking Sites , pp.51-60 http://dx.doi.org/10.14257/ijsia.2014.8.6.05 Implementation of Biometric Techniques in Social Networking Sites Shilpi Sharma 1 and J. S. Sodhi 2 Computer Science and Engineering Department,

More information

Application of Biometrics to Obtain High Entropy Cryptographic Keys

Application of Biometrics to Obtain High Entropy Cryptographic Keys 1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is

More information

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering

More information

Reliability of Fingerprint Verification in Ghana

Reliability of Fingerprint Verification in Ghana Reliability of Fingerprint Verification in Ghana Osman Yakubu Garden City University College Department of Computer Science Kenyasi, Kumasi, Ghana ABSTRACT Biometric recognition refers to the automatic

More information

An Implementation of a High Capacity 2D Barcode

An Implementation of a High Capacity 2D Barcode An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development

More information

Signature-based Biometric Authentication

Signature-based Biometric Authentication Abstract Signature-based Biometric Authentication Srikanta Pal 1, Umapada Pal 2 and Michael Blumenstein 1 1 School of Information and Communication Technology, Griffith University, Gold Coast, Australia.

More information